Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

LAN, Switching and Routing: %C6KPWR-SP-4-DISABLED: power to module in slot

Slot 9 has SSL Module WS-SVC-SSL 1 SAD081200NF

Log says:

Apr 20 11:52:51: %OIR-SP-3-PWRCYCLE: Card in module 9, is being power-cycled off (Module not responding to Keep Alive polling)

Is there a way of connecting to the SSL module in slot 9 and getting any CRASHINFO file from the SSL module or some such thing to see why this module did not respond or do I have to connect a console directly to SSL module console port?

Appears like issue in CSCdz21419 but we are already running IOS 12.2(17a)SX1 which fixes this issue.

========================================

More of log below:

========================================

Apr 20 11:44:52: %CSM_SLB-6-RSERVERSTATE: Module 8 server state changed: SLB-NETMGT: HTTP health probe failed for server 172.25.9.30:80 in serverfarm 'WEBSEAL-SFARM'

Apr 20 11:45:13: %CSM_SLB-6-RSERVERSTATE: Module 8 server state changed: SLB-NETMGT: HTTP health probe re-activated server 172.25.9.30:80 in serverfarm 'WEBSEAL-SFARM'

Apr 20 11:52:52: %SNMP-5-MODULETRAP: Module 9 [Down] Trap

Apr 20 11:52:51: %OIR-SP-3-PWRCYCLE: Card in module 9, is being power-cycled off (Module not responding to Keep Alive polling)

Apr 20 11:52:52: %C6KPWR-SP-4-DISABLED: power to module in slot 9 set off (Module not responding to Keep Alive polling)

Apr 20 11:53:51: SP: OS_BOOT_STATUS(9) AP OS Boot Status: finished booting

Apr 20 11:54:40: %DIAG-SP-6-RUN_COMPLETE: Module 9: Running Complete Diagnostics...

Apr 20 11:54:41: %SNMP-5-MODULETRAP: Module 9 [Up] Trap

Apr 20 11:54:41: %MLS_RATE-4-DISABLING: The Layer2 Rate Limiters have been disabled.

Apr 20 11:54:41: %DIAG-SP-6-DIAG_OK: Module 9: Passed Online Diagnostics

Apr 20 11:54:41: %OIR-SP-6-INSCARD: Card inserted in slot 9, interfaces are now online

Apr 20 13:25:03: %CSM_SLB-6-RSERVERSTATE: Module 8 server state changed: SLB-NETMGT: HTTP health probe failed for server 172.25.47.197:0 in serverfarm 'GPRS-MOBTST-TOR'

5 REPLIES
Cisco Employee

Re: LAN, Switching and Routing: %C6KPWR-SP-4-DISABLED: power to

the SSLM probably crashed or hung.

As a measure of precaution the SUP restarted the module.

The problem is that all info about the SSLM state is lost when doing this.

There is a command to prevent the SUP to reload the SSLM so we can check the SSLM and collect necessary data.

This is most probably an SSLM issue - not ios.

So you should run the latest SSLM version just in case this is a known issue that has been fixed already.

If the problem comes back with the latest version, open a case with the TAC so they can guide you through the procedure to disable the SUP auto-restart function.

Thanks,

Gilles.

New Member

Re: LAN, Switching and Routing: %C6KPWR-SP-4-DISABLED: power to

Gilles,

Can you give me two help:

1. How to make the SUP720 from doing the AUT RESTART - what commands.

2. Once we have done (1) above do we connect directly to console of SSL and investigate the crash or crashinfo file or log file or can we telnet to the SSL (I doubt it) when the SSL is in the failed condition.

New Member

Re: LAN, Switching and Routing: %C6KPWR-SP-4-DISABLED: power to

Gilles,

In case you need more information - the SSL code appears very old:

------------------ show module ------------------

Mod Ports Card Type Model Serial No.

--- ----- -------------------------------------- ------------------ -----------

1 4 CEF720 4 port 10-Gigabit Ethernet WS-X6704-10GE SAL09422YSH

2 4 CEF720 4 port 10-Gigabit Ethernet WS-X6704-10GE SAL09391P5U

3 16 16 port 1000mb MTRJ ethernet WS-X6416-GE-MT SAD043300UX

4 6 Firewall Module WS-SVC-FWM-1 SAD071903HZ

5 2 Supervisor Engine 720 (Active) WS-SUP720-BASE SAD072403CU

7 4 CEF720 4 port 10-Gigabit Ethernet WS-X6704-10GE SAL09169MCU

8 0 SLB Application Processor Complex WS-X6066-SLB-APC SAD080707SM

9 1 SSL Module WS-SVC-SSL-1 SAD081200NF

New Member

Re: LAN, Switching and Routing: %C6KPWR-SP-4-DISABLED: power to

Mod MAC addresses Hw Fw Sw Status

--- ---------------------------------- ------ ------------ ------------ -------

1 0015.c62c.0634 to 0015.c62c.0637 2.2 12.2(14r)S5 12.2(17a)SX1 Ok

2 0015.6305.97b0 to 0015.6305.97b3 2.2 12.2(14r)S5 12.2(17a)SX1 Ok

3 00d0.d3a7.9756 to 00d0.d3a7.9765 1.1 5.4(2) 8.2(0.56)TET Ok

4 0003.feab.76ce to 0003.feab.76d5 2.0 7.2(1) 1.1(3)17 Ok

5 000c.ce64.0e08 to 000c.ce64.0e0b 2.1 7.7(1) 12.2(17a)SX1 Ok

7 0013.c38b.c650 to 0013.c38b.c653 2.2 12.2(14r)S5 12.2(17a)SX1 Ok

8 000e.847f.9e08 to 000e.847f.9e0f 1.7 3.2(1) Ok

9 000f.348d.cd60 to 000f.348d.cd67 3.0 7.2(1) 1.2(2) Ok

Mod Sub-Module Model Serial Hw Status

--- --------------------------- ------------------ ------------ ------- -------

1 Distributed Forwarding Card WS-F6700-DFC3A SAD08170D3Z 2.2 Ok

2 Distributed Forwarding Card WS-F6700-DFC3A SAD082108RP 2.2 Ok

5 Policy Feature Card 3 WS-F6K-PFC3A SAD072501HF 1.1 Ok

5 MSFC3 Daughterboard WS-SUP720 SAD072501RP 1.2 Ok

7 Centralized Forwarding Card WS-F6700-CFC SAL08486KU5 2.0 Ok

Cisco Employee

Re: LAN, Switching and Routing: %C6KPWR-SP-4-DISABLED: power to

> a) Get into the SP console:

> cat6k-rp# remote login switch

>

> b) Execute the debug command:

> cat6k-sp# debug oir no-reset-on-crash

> For all the slots where the CSMs exist.

>

When the SSL hang, you need console access to collect data like 'show proc cpu' so we can see what the device is doing.

251
Views
5
Helpful
5
Replies
CreatePlease to create content